X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
greyhole attack (7) 7
routing (6) 6
blackhole attack (5) 5
networks (4) 4
routing protocols (4) 4
wireless networks (4) 4
ad hoc networks (3) 3
computer science, information systems (3) 3
mobile ad hoc networks (3) 3
mobile communication systems (3) 3
mobile computing (3) 3
protocol (3) 3
telecommunications (3) 3
computer communication networks (2) 2
computer networks (2) 2
delay (2) 2
delays (2) 2
denial of service attack (2) 2
denial of service attacks (2) 2
manets (2) 2
rrep packet (2) 2
rreq packet (2) 2
security (2) 2
trust request packet (2) 2
wormhole attack (2) 2
[ info ] computer science [cs] (1) 1
[ shs.info ] humanities and social sciences/library and information sciences (1) 1
[info] computer science [cs] (1) 1
[shs.info] humanities and social sciences/library and information sciences (1) 1
accuracy (1) 1
ad hoc (1) 1
algorithm analysis and problem complexity (1) 1
algorithms (1) 1
analysis (1) 1
aodv (1) 1
artificial intelligence (1) 1
attacks on routing protocols (1) 1
blackhole (1) 1
cellular communication (1) 1
collaborative greyhole attack (1) 1
collusion (1) 1
communications engineering, networks (1) 1
computer crime (1) 1
computer information security (1) 1
computer science (1) 1
computer security (1) 1
computer simulation (1) 1
connectivity (1) 1
construction (1) 1
control (1) 1
cooperation (1) 1
data security (1) 1
delay tolerant network (1) 1
denial-of-service (1) 1
design engineering (1) 1
dos-attacke (1) 1
drop forging (1) 1
dsdv (1) 1
dsr (1) 1
dtn (1) 1
electrical engineering (1) 1
encounter record (1) 1
encounters (1) 1
engineering (1) 1
engineering, electrical & electronic (1) 1
erbium (1) 1
exchange (1) 1
finite element method (1) 1
flooding attack (1) 1
flooding attak (1) 1
forges (1) 1
forwarding assessment based detection (1) 1
greyhole (1) 1
greyhole attacks (1) 1
history (1) 1
hoc (1) 1
humanities and social sciences (1) 1
information storage and retrieval (1) 1
information systems applications (1) 1
infrastructure (1) 1
it in business (1) 1
library and information sciences (1) 1
maliciousness (1) 1
manet (1) 1
messages (1) 1
methods (1) 1
mobile nodes (1) 1
non preemptive add-on femtocell (1) 1
packet loss (1) 1
peer-to-peer computing (1) 1
preempting (1) 1
preemptive (1) 1
research (1) 1
routers (1) 1
routing-protokoll (1) 1
rushing attack (1) 1
security management (1) 1
software engineering (1) 1
spray & focus (1) 1
switching (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE Transactions on Mobile Computing, ISSN 1536-1233, 05/2016, Volume 15, Issue 5, pp. 1116 - 1129
Delay Tolerant Network (DTN) is developed to cope with intermittent connectivity and long delay in wireless networks. Due to the limited connectivity, DTN is... 
blackhole attack | Accuracy | collusion | flooding attack | encounter record | greyhole attack | Peer-to-peer computing | Delays | History | Erbium | Mobile computing | DTN | Blackhole attack | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | Wireless networks | Exchange | Drop forging | Design engineering | Networks | Messages | Encounters | Forges | Delay
Journal Article
International Journal of Ad Hoc and Ubiquitous Computing, ISSN 1743-8225, 2018, Volume 28, Issue 3, pp. 131 - 147
Routing, having pivotal role in MANETs, assumes nodes' cooperation for its processes. However, this assumption exposes routing to various insider and outsider... 
Blackhole attack | MANETs | Routing | Greyhole attack | Trust | Trust management | Mobile ad hoc networks | blackhole attack | trust | routing | mobile ad hoc networks | PROTOCOL | COMPUTER SCIENCE, INFORMATION SYSTEMS | greyhole attack | trust management | TELECOMMUNICATIONS | HOC | Ad hoc networks | Mobile communication systems | Wireless networks | Trustworthiness | Cooperation
Journal Article
Journal of Computational and Theoretical Nanoscience, ISSN 1546-1955, 07/2016, Volume 13, Issue 7, pp. 4573 - 4579
To overcome the number of hops between mesh routers and Internet gateways a new mechanism of femtocell as additional internet gateway is introduced. Mesh... 
Preemptive | Non Preemptive Add-On Femtocell | Forwarding Assessment Based Detection | Collaborative Greyhole Attack | Finite element method | Networks | Cellular communication | Routers | Switching theory | Computer networks | Preempting | Switching
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2012, Volume 7564, pp. 80 - 91
Conference Proceeding
2016 International Conference on Computing, Communication and Automation (ICCCA), 04/2016, pp. 525 - 530
Mobile Ad-hoc Network (MANET) is based on the routing algorithm which adapts the random changes that may occur in the network topology. MANET is the network... 
DSDV | Wormhole attack | DSR | Routing | Routing protocols | Greyhole attack | Mobile nodes | Blackhole Attack | AODV | Mobile ad hoc networks
Conference Proceeding
2015 International Conference on Advances in Computer Engineering and Applications, 03/2015, pp. 791 - 798
Mobile Adhoc Networks (MANETs) are networks of mobile nodes which have limited resources in terms of processing power, memory and battery life. The traffic to... 
Wormhole attack | Sybil Attack | Attacks on routing protocols | Flooding attak | Routing | Ad hoc networks | Greyhole attack | Computer crime | Blackhole attack | Rushing attack | MANETs | Routing protocols | Mobile computing | Routing Protocols | Networks | Mobile communication systems | Wireless networks | Infrastructure | Computer networks | Protocol (computers) | Routing (telecommunications)
Conference Proceeding
2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), 07/2013, pp. 1 - 8
A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes that forms a temporary network in decentralized manner. Security has become a primary... 
Wormhole | Greyhole | Ad hoc | Routing | Routing protocols | Ad hoc networks | Delays | Blackhole | Security | Mobile computing | Networks | Denial of service attacks | Construction | Mobile communication systems | Wireless networks | Computer information security
Conference Proceeding
2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 03/2017, Volume 2018-, pp. 1 - 4
A self maintained infrastructure less network is MANET. Each node must forward traffic unrelated to its own use and therefore be a router. Due to its wide... 
blackhole attack | MANET | greyhole attacks | Trust mechanisms | Packet loss | Routing | Throughput | Routing protocols | Mobile ad hoc networks
Conference Proceeding
2012, Lecture Notes in Computer Science, ISBN 9783642332593, Volume 7564
This paper aims to propose a new trust-based Intrusion Detection system (IDS) for wireless, ad-hoc networks with or without mobility of nodes. In fact, the... 
Software Engineering | Computer Science | Information Storage and Retrieval | Artificial Intelligence (incl. Robotics) | Information Systems Applications (incl. Internet) | Computer Communication Networks | Algorithm Analysis and Problem Complexity
Book Chapter
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.